Loading…
A System Framework of Security Management in Enterprise Systems
After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel st...
Saved in:
Published in: | Systems research and behavioral science 2013-05, Vol.30 (3), p.287-299 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483 |
---|---|
cites | cdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483 |
container_end_page | 299 |
container_issue | 3 |
container_start_page | 287 |
container_title | Systems research and behavioral science |
container_volume | 30 |
creator | Wang, Feng Ge, Baoshan Zhang, Li Chen, Yong Xin, Yang Li, Xiayuan |
description | After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley & Sons, Ltd. |
doi_str_mv | 10.1002/sres.2184 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1418130541</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1418130541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</originalsourceid><addsrcrecordid>eNqFkMFKw0AQQIMoWKsH_yDgRQ9pZ7K73eYkRdoqVAWjFrwsm2QiaZuk7qbU_r1bWzwI4mGZPbw3MM_zzhE6CBB2rSHbCbHPD7wWQhQFKDk7_P6HgYSwd-ydWDsDQEDElnc98OONbaj0R0aXtK7N3K9zP6Z0ZYpm49_rSr9TSVXjF5U_rBoyS1NY2lv21DvK9cLS2X62vZfR8PnmNpg8ju9uBpMg5YA8kJEUPJFJxjHMk5TnSJlMQpBCR5xI95nOc2RRAolOU9HDjITMCDJGCYS8z9re5W7v0tQfK7KNKgub0mKhK6pXViHHPjIQHP9HmQx77glw6MUvdFavTOUOcZSQACwSwlFXOyo1tXWBc-USlNpsFILaVlfb6mpb3bHdHbsuFrT5G1Tx0zDeG8HOKFzQzx9Dm7nqSSaFmj6MVRS_Ttn0baxG7AuMSJJR</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1357003955</pqid></control><display><type>article</type><title>A System Framework of Security Management in Enterprise Systems</title><source>International Bibliography of the Social Sciences (IBSS)</source><source>Wiley-Blackwell Read & Publish Collection</source><source>Business Source Ultimate (EBSCOHost)</source><creator>Wang, Feng ; Ge, Baoshan ; Zhang, Li ; Chen, Yong ; Xin, Yang ; Li, Xiayuan</creator><creatorcontrib>Wang, Feng ; Ge, Baoshan ; Zhang, Li ; Chen, Yong ; Xin, Yang ; Li, Xiayuan</creatorcontrib><description>After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley & Sons, Ltd.</description><identifier>ISSN: 1092-7026</identifier><identifier>EISSN: 1099-1743</identifier><identifier>DOI: 10.1002/sres.2184</identifier><language>eng</language><publisher>Chichester: Blackwell Publishing Ltd</publisher><subject>Agents (artificial intelligence) ; Authentication ; Authentication protocols ; Channels ; Computer equipment ; Computer science ; enterprise systems ; ERP ; Identification ; identity authentication ; Internet security ; Management ; network security pattern ; Networks ; Secure Sockets Layer protocol ; Security ; Security management ; Sockets ; Strategy ; Studies ; system security management ; Technology ; Virtual private networks ; Work place</subject><ispartof>Systems research and behavioral science, 2013-05, Vol.30 (3), p.287-299</ispartof><rights>Copyright © 2013 John Wiley & Sons, Ltd.</rights><rights>Copyright Wiley Periodicals Inc. May/Jun 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</citedby><cites>FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902,33200,33201</link.rule.ids></links><search><creatorcontrib>Wang, Feng</creatorcontrib><creatorcontrib>Ge, Baoshan</creatorcontrib><creatorcontrib>Zhang, Li</creatorcontrib><creatorcontrib>Chen, Yong</creatorcontrib><creatorcontrib>Xin, Yang</creatorcontrib><creatorcontrib>Li, Xiayuan</creatorcontrib><title>A System Framework of Security Management in Enterprise Systems</title><title>Systems research and behavioral science</title><addtitle>Syst. Res</addtitle><description>After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley & Sons, Ltd.</description><subject>Agents (artificial intelligence)</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Channels</subject><subject>Computer equipment</subject><subject>Computer science</subject><subject>enterprise systems</subject><subject>ERP</subject><subject>Identification</subject><subject>identity authentication</subject><subject>Internet security</subject><subject>Management</subject><subject>network security pattern</subject><subject>Networks</subject><subject>Secure Sockets Layer protocol</subject><subject>Security</subject><subject>Security management</subject><subject>Sockets</subject><subject>Strategy</subject><subject>Studies</subject><subject>system security management</subject><subject>Technology</subject><subject>Virtual private networks</subject><subject>Work place</subject><issn>1092-7026</issn><issn>1099-1743</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>8BJ</sourceid><recordid>eNqFkMFKw0AQQIMoWKsH_yDgRQ9pZ7K73eYkRdoqVAWjFrwsm2QiaZuk7qbU_r1bWzwI4mGZPbw3MM_zzhE6CBB2rSHbCbHPD7wWQhQFKDk7_P6HgYSwd-ydWDsDQEDElnc98OONbaj0R0aXtK7N3K9zP6Z0ZYpm49_rSr9TSVXjF5U_rBoyS1NY2lv21DvK9cLS2X62vZfR8PnmNpg8ju9uBpMg5YA8kJEUPJFJxjHMk5TnSJlMQpBCR5xI95nOc2RRAolOU9HDjITMCDJGCYS8z9re5W7v0tQfK7KNKgub0mKhK6pXViHHPjIQHP9HmQx77glw6MUvdFavTOUOcZSQACwSwlFXOyo1tXWBc-USlNpsFILaVlfb6mpb3bHdHbsuFrT5G1Tx0zDeG8HOKFzQzx9Dm7nqSSaFmj6MVRS_Ttn0baxG7AuMSJJR</recordid><startdate>201305</startdate><enddate>201305</enddate><creator>Wang, Feng</creator><creator>Ge, Baoshan</creator><creator>Zhang, Li</creator><creator>Chen, Yong</creator><creator>Xin, Yang</creator><creator>Li, Xiayuan</creator><general>Blackwell Publishing Ltd</general><general>Wiley Periodicals Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8BJ</scope><scope>8FD</scope><scope>FQK</scope><scope>JBE</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201305</creationdate><title>A System Framework of Security Management in Enterprise Systems</title><author>Wang, Feng ; Ge, Baoshan ; Zhang, Li ; Chen, Yong ; Xin, Yang ; Li, Xiayuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Agents (artificial intelligence)</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Channels</topic><topic>Computer equipment</topic><topic>Computer science</topic><topic>enterprise systems</topic><topic>ERP</topic><topic>Identification</topic><topic>identity authentication</topic><topic>Internet security</topic><topic>Management</topic><topic>network security pattern</topic><topic>Networks</topic><topic>Secure Sockets Layer protocol</topic><topic>Security</topic><topic>Security management</topic><topic>Sockets</topic><topic>Strategy</topic><topic>Studies</topic><topic>system security management</topic><topic>Technology</topic><topic>Virtual private networks</topic><topic>Work place</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Feng</creatorcontrib><creatorcontrib>Ge, Baoshan</creatorcontrib><creatorcontrib>Zhang, Li</creatorcontrib><creatorcontrib>Chen, Yong</creatorcontrib><creatorcontrib>Xin, Yang</creatorcontrib><creatorcontrib>Li, Xiayuan</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>Technology Research Database</collection><collection>International Bibliography of the Social Sciences</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Systems research and behavioral science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Feng</au><au>Ge, Baoshan</au><au>Zhang, Li</au><au>Chen, Yong</au><au>Xin, Yang</au><au>Li, Xiayuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A System Framework of Security Management in Enterprise Systems</atitle><jtitle>Systems research and behavioral science</jtitle><addtitle>Syst. Res</addtitle><date>2013-05</date><risdate>2013</risdate><volume>30</volume><issue>3</issue><spage>287</spage><epage>299</epage><pages>287-299</pages><issn>1092-7026</issn><eissn>1099-1743</eissn><abstract>After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley & Sons, Ltd.</abstract><cop>Chichester</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sres.2184</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1092-7026 |
ispartof | Systems research and behavioral science, 2013-05, Vol.30 (3), p.287-299 |
issn | 1092-7026 1099-1743 |
language | eng |
recordid | cdi_proquest_miscellaneous_1418130541 |
source | International Bibliography of the Social Sciences (IBSS); Wiley-Blackwell Read & Publish Collection; Business Source Ultimate (EBSCOHost) |
subjects | Agents (artificial intelligence) Authentication Authentication protocols Channels Computer equipment Computer science enterprise systems ERP Identification identity authentication Internet security Management network security pattern Networks Secure Sockets Layer protocol Security Security management Sockets Strategy Studies system security management Technology Virtual private networks Work place |
title | A System Framework of Security Management in Enterprise Systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T15%3A29%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20System%20Framework%20of%20Security%20Management%20in%20Enterprise%20Systems&rft.jtitle=Systems%20research%20and%20behavioral%20science&rft.au=Wang,%20Feng&rft.date=2013-05&rft.volume=30&rft.issue=3&rft.spage=287&rft.epage=299&rft.pages=287-299&rft.issn=1092-7026&rft.eissn=1099-1743&rft_id=info:doi/10.1002/sres.2184&rft_dat=%3Cproquest_cross%3E1418130541%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1357003955&rft_id=info:pmid/&rfr_iscdi=true |